any attempt to intercept the data will alter its state, making it virtually impossible for unauthorized users to get its source. For example, if your program is free software: you can do